Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Overview of Bifluid-based Photovoltaic Thermal (PVT) Systems

10.11591/ijpeds.v9.i4.pp1912-1917
Nurul Shahirah Binti Rukman , Ahmad Fudholi , Saleem H. Zaidi , Kamaruzzaman Sopian
This review presents various research and development, as well as design and performances of bifluid-based PVT systems. Moreover, the development of PVT system is a very promising area of research. PVT systems using in various applications, such as solar drying, solar cooling, water heating, desalination, and pool heating. With the recognition of the potentials and contributions of PV system, considerable research has been conducted to attain the most advancement which may produce reliable and sustainable PVT system. The cooling system’s design refers to the absorber design which mostly focuses on water and air-based PVT systems. An air-based system has been developed through different absorber configurations, air flow modes and single- or double-pass design. Bifluid-based PVT system is used to remove heat accumulated in a PV panel and reuses the waste heat (hot air and water) in an appropriate way. PV, thermal and PVT efficiencies of bifluid PVT systems were 6.6%-18.6%, 31%–90% and 60%-83%, respectively. 
Volume: 9
Issue: 4
Page: 1912-1917
Publish at: 2018-12-01

A Novel Hybrid Classification Approach for Sentiment Analysis of Text Document

10.11591/ijece.v8i6.pp4554-4567
Yassine Al Amrani , Mohamed Lazaar , Kamal Eddine El Kadiri
Sentiment analysis is a more popular area of highly active research in Automatic Language Processing. She assigns a negative or positive polarity to one or more entities using different natural language processing tools and also predicted high and low performance of various sentiment classifiers. Our approach focuses on the analysis of feelings resulting from reviews of products using original text search techniques. These reviews can be classified as having a positive or negative feeling based on certain aspects in relation to a query based on terms. In this paper, we chose to use two automatic learning methods for classification: Support Vector Machines (SVM) and Random Forest, and we introduce a novel hybrid approach to identify product reviews offered by Amazon. This is useful for consumers who want to research the sentiment of products before purchase, or companies that want to monitor the public sentiment of their brands. The results summarize that the proposed method outperforms these individual classifiers in this amazon dataset.
Volume: 8
Issue: 6
Page: 4554-4567
Publish at: 2018-12-01

Caching on Named Data Network: a Survey and Future Research

10.11591/ijece.v8i6.pp4456-4466
Leanna Vidya Yovita , Nana Rachmana Syambas
The IP-based system cause inefficient content delivery process. This inefficiency was attempted to be solved with the Content Distribution Network. A replica server is located in a particular location, usually on the edge router that is closest to the user. The user’s request will be served from that replica server. However, caching on Content Distribution Network is inflexible. This system is difficult to support mobility and conditions of dynamic content demand from consumers. We need to shift the paradigm to content-centric. In Named Data Network, data can be placed on the content store on routersthat are closest to the consumer. Caching on Named Data Network must be able to store content dynamically. It should be selectively select content that is eligible to be stored or deleted from the content storage based on certain considerations, e.g. the popularity of content in the local area. This survey paper explains the development of caching techniques on Named Data Network that are classified into main points. The brief explanation of advantages and disadvantages are presented to make it easy to understand. Finally, proposed the open challenge related to the caching mechanism to improve NDN performance.
Volume: 8
Issue: 6
Page: 4456-4466
Publish at: 2018-12-01

Novel Framework for Navigation using Enhanced Fuzzy Approach with Sliding Mode Controller

10.11591/ijece.v8i6.pp4310-4320
T. Someswari , Anil Kumar Tiwari , Nagaraj R.
The reliability of any embedded navigator in advanced vehicular system depends upon correct and precise information of navigational data captured and processed to offer trustworthy path. After reviewing the existing system, a significant trade-off is explored between the existing navigational system and present state of controller design on various case studies and applications. The existing design of controller system for navigation using error-prone GPS/INS data doesn‟t emphasize on sliding mode controller. Although, there has been good number of studies in sliding mode controller, it is less attempted to optimize the navigational performance of a vehicle. Therefore, this paper presents a novel optimized design of a sliding mode controller that can be effectively deployed on advanced navigational system. The study outcome was found to offer higher speed, optimal control signal, and lower error occurances to prove that proposed system offers reliable and optimized navigational services in contrast to existing system.
Volume: 8
Issue: 6
Page: 4310-4320
Publish at: 2018-12-01

PORM: Predictive Optimization of Risk Management to control Uncertainty Problems in Software Engineering

10.11591/ijece.v8i6.pp4735-4744
Salma Firdose , L. Manjunath Rao
Irrespective of different research-based approaches toward risk management, developing a precise model towards risk management is found to be a computationally challenging task owing to critical and vague definition of the origination of the problems. This research work introduces a model called as PROM i.e. Predictive Optimization of Risk Management with the perspective of software engineering. The significant contribution of PORM is to offer a reliable computation of risk analysis by considering generalized practical scenario of software development practices in Information Technology (IT) industry. The proposed PORM system is also designed and equipped with better risk factor assessment with an aid of machine learning approach without having more involvement of iteration. The study outcome shows that PORM system offers computationally cost effective analysis of risk factor as assessed with respect to different quality standards of object oriented system involved in every software projects.
Volume: 8
Issue: 6
Page: 4735-4744
Publish at: 2018-12-01

Shape and Level Bottles Detection Using Local Standard Deviation and Hough Transform

10.11591/ijece.v8i6.pp5032-5040
Nor Nabilah Syazana Abdul Rahman , Norhashimah Mohd Saad , Abdul Rahim Abdullah
This paper presents shape and level analysis using local standard deviation and Hough transform technique to detect the shape and level of the bottle.A 155 sample images are used as a test product to detect shape and level. Local standard deviation is used contrast gain technique to segment the shape of the bottle by enhancing the contrast of the image. The ratio of the area is calculated from the extent parameter. The maximum and minimum water level is created by using Hough transform technique to identify the level of the water. Decision tree is applied to classify the shape and level of the bottle either good or defect condition. From experimental result, 97% and 93% accuracy of shape and level is achieved which shows that the proposed analysis technique is potential to be applied for beverages product inspection system.
Volume: 8
Issue: 6
Page: 5032-5040
Publish at: 2018-12-01

Design and Simulation of the Control System for Inverter-fed Permanent Magnet Synchronous Motor Drive

10.11591/ijeecs.v12.i3.pp958-967
Ramana Pilla , Santukumari Killari , K.B.Madhu Sahu
Development in the field of power electronics, cost effective DSP’s and microprocessors have opened a new era in the design and implement modern control strategies for variable speed drives. This paper presents the design of a control system which includes a non-linear controller and observer for inverter fed Permanent Magnet Synchronous Motor (PMSM) Drive. The entire design is carried out by designing of Speed Controller, Non-linear controller (NLC), State feedback controller (SFC), H∞ controller as well as Non-linear full order observer (NFO). The proposed control scheme is extensively simulated under various conditions using MATLAB/Simulink, which shows better performance under all operating conditions for variable speed PMSM drive.
Volume: 12
Issue: 3
Page: 958-967
Publish at: 2018-12-01

Low-voltage Ride-through Methods for Grid-connected Photovoltaic Systems in Microgrids: A Review and Future Prospect

10.11591/ijpeds.v9.i4.pp1834-1841
Haval Sardar Kamil , Dalila Mat Said , Mohd Wazir Mustafa , Mohammad Reza Miveh , Nasarudin Ahmad
Power quality is a concern for utility and grid operators due to a large penetration of intermittent and stochastic renewable power generation sources. One of the major concerns, when designing and controlling grid-feeding photovoltaic (PV) inverters is meeting the grid requirements. International grid requirements demand low-voltage ride-through (LVRT) capability and maintaining grid functionality during fault conditions. This paper presents a comprehensive review for several control techniques to assure the LVRT capability of grid-feeding converters as well as discussing their respective advantages and limitations in detail. Areas for further research are identified afterwards. Finally, the conclusion gives a brief summary and critique of the findings.
Volume: 9
Issue: 4
Page: 1834-1841
Publish at: 2018-12-01

Classification of the Mainstay Economic Region Using Decision Tree Method

10.11591/ijeecs.v12.i3.pp1037-1044
Heru Ismanto , Azhari Azhari , Suharto Suharto , Lincolin Arsyad
The development of the region cannot be separated from the concept of economic growth and the determination of the mainstay region as a regional center that is expected to have a positive impact on economic growth to the surrounding regions. In fact, the determination of the mainstay region is a difficult thing to do. Some cases of the determination of the mainstay region are mostly on the basis of the prerogative rights of the policy makers without carefully seeing the achievements of the development of a region. The objective of this study is to develop a classification model of the mainstay economic region using computational techniques. The decision tree methods of NBTree and J48 are used in this study and combined with Klassen typology. The results of this study show that J48 algorithm has better accuracy than NBTree in the formation process of decision tree. The accuracy of J48 is higher than NBTree i.e. 68.96%. The comparative result of the classification of the mainstay economic region between Klassen and J48 shows that there is a shift in the class position of the development quadrant. In Klassen classification, there are three regions that are categorized into the mainstay regions with advanced development and rapid growth (K1). Meanwhile, J48 results show that there is no region categorized into K1. However, the mainstay economic region on J48 is based on the level of development with the level below K1, i.e. K2. J48 classification results show that there are ten regencies that are categorized into the mainstay economic regions, namely Biak, Regency of Jayapura, Jayawijaya, Kerom, Merauke, Mimika, Nabire, Ndunga, Yapen, and the Municipality of Jayapura.
Volume: 12
Issue: 3
Page: 1037-1044
Publish at: 2018-12-01

An Efficient Activity Detection System based on Skeleton Joints Identification

10.11591/ijece.v8i6.pp4995-5003
Abdul Lateef Haroon P.S , U. Eranna
The increasing criminal activities in the current world has drawn lot of interest activity recognition techniques which helps to perform the sophistical analytical operations on human activity and also helps to interface the human and computer interactions. From the existing review analysis it is found that most of the existing systems are not emphasize on computational performance but are more application specific by identifying specific problems. Hence, it is found that all the features are not required for accurate and cost effective human activity detection. Thus, the human skelton action can be considered and presented a simple and accurate process to identify the significant joints only. From the outcomes it is found that the proposed system is cost effective and computational efficient activity recognition technique for human actions.
Volume: 8
Issue: 6
Page: 4995-5003
Publish at: 2018-12-01

Transient Monitoring Function based Fault Classifier for Relaying Applications

10.11591/ijece.v8i6.pp4089-4095
P. R. Pattanaik , S. Pati , S. K. Sanyal
This paper proposes Transient monitoring function (TMF) based fault classification approach for transmission line protection. The classifier provides accurate results under various system conditions involving fault resistance, inception angle, location and load angle. The transient component during fault is measured by TMF and appropriate logics applied for fault classification. Simulation studies using MATLAB®/SIMULINK™ are carried out for a 400 kV, 50 Hz power system with variable system conditions. Results show that the proposed classifier has high classification accuracy. The method developed has been compared with a fault classification technique based on Discrete Wavelet Transform (DWT). The proposed technique can be implemented for real time protection schemes employing distance relaying.
Volume: 8
Issue: 6
Page: 4089-4095
Publish at: 2018-12-01

Revealing AES Encryption Device Key on 328P Microcontrollers with Differential Power Analysis

10.11591/ijece.v8i6.pp5144-5152
Septafiansyah Dwi Putra , Adang Suwandi Ahmad , Sarwono Sutikno , Yusuf Kurniawan , Arwin Datumaya Wahyudi Sumari
This research demonstrates the revealing of an advanced encryption standard (AES) encryption device key. The encryption device is applied to an ATMEGA328P microcontroller. The said microcontroller is a device commonly used in internet of things (IoT). We measured power consumption when the encryption process is taking place. The message sent to the encryption device is randomly generated, but the key used has a fixed value. The novelty of this research is the creation of a systematic and optimal circuit in carrying the differential power analysis or difference of means (DPA/DoM) technique, so the technique can be applied in key revealing on a microcontroller device by using 500 traces in 120 seconds.
Volume: 8
Issue: 6
Page: 5144-5152
Publish at: 2018-12-01

Twitter Sentiment Analysis on 2013 Curriculum Using Ensemble Features and K-Nearest Neighbor

10.11591/ijece.v8i6.pp5409-5414
M. Rizzo Irfan , M. Ali Fauzi , Tibyani Tibyani , Nurul Dyah Mentari
2013 curriculum is a new curriculum in the Indonesian education system which has been enacted by the government to replace KTSP curriculum. The implementation of this curriculum in the last few years has sparked various opinions among students, teachers, and public in general, especially on social media twitter. In this study, a sentimental analysis on 2013 curriculum is conducted. Ensemble of several feature sets were used twitter specific features, textual features, Parts of Speech (POS) features, lexicon based features, and Bag of Words (BOW) features for the sentiment classification using K-Nearest Neighbor method. The experiment result showed that the the ensemble features have the best performance of sentiment classification compared to only using individual features. The best accuracy using ensemble features is 96% when k=5 is used.
Volume: 8
Issue: 6
Page: 5409-5414
Publish at: 2018-12-01

Profit Driven Decision Assist System to Select Efficient IaaS Providers

10.11591/ijece.v8i6.pp4398-4411
Mohan Murthy MK , Sanjay HA , Supreeth BM
IaaS providers provide infrastructure to the end users with various pricing schemes and models. They provide different types of virtual machines (small, medium, large, etc.). Since each IaaS provider uses their own pricing schemes and models, price varies from one provider to the other for the same requirements. To select a best IaaS provider, the end users need to consider various parameters such as SLA, pricing models/schemes, VM heterogeneity, etc. Since many parameters are involved, selecting an efficient IaaS provider is a challenging job for an end user. To address this issue, in this work we have designed, implemented and tested a decision-assist system which assists the end users to select efficient IaaS provider(s). Our decision-assist system consists of an analytical model to calculate the cost and decision strategies to assist the end user in selecting the efficient IaaS provider(s). The decision assist system considers various relevant parameters such as VM configuration, price, availability, etc. to decide the efficient IaaS provider(s). Rigorous experiments have been conducted by emulating various IaaS providers, and we have observed that our DAS successfully suggests the efficient IaaS provider/ providers by considering the input parameters given by the user.
Volume: 8
Issue: 6
Page: 4398-4411
Publish at: 2018-12-01

Design and Implementation of a Contactless Smart House Network System

10.11591/ijece.v8i6.pp4663-4672
Mohammed Issam Younis , Taif Fadhil Hussein
The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two main parts: the main station part and the wireless house nodes part. The local wireless communication between the house nodes and the main station is done through ZigBee technology with low power and low data rate. The mode of operation of these house nodes can be configured dynamically by the end user and determined multicast or broadcast operation according to the user requirements. The implementation and upgrading of SHNS are costless, flexible and required less power comparing with other reviewed systems.
Volume: 8
Issue: 6
Page: 4663-4672
Publish at: 2018-12-01
Show 1350 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration